Boa Web Server versions 0.94.13 through 0.94.14 fail to validate the correct security constraint on the HEAD HTTP method allowing everyone to bypass the Basic Authorization mechanism.
Max CVSS
5.3
EPSS Score
0.11%
Published
2022-12-12
Updated
2022-12-15
Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL.
Max CVSS
9.8
EPSS Score
0.12%
Published
2022-11-23
Updated
2024-04-11
Boa 0.94.13 allows remote attackers to obtain sensitive information via a misconfiguration involving backup.html, preview.html, js/log.js, log.html, email.html, online-users.html, and config.js. NOTE: multiple third parties report that this is a site-specific issue because those files are not part of Boa.
Max CVSS
7.5
EPSS Score
0.29%
Published
2021-05-27
Updated
2024-04-11
Boa through 0.94.14rc21 allows remote attackers to trigger a memory leak because of missing calls to the free function.
Max CVSS
7.5
EPSS Score
0.21%
Published
2019-10-11
Updated
2019-10-16
Boa through 0.94.14rc21 allows remote attackers to trigger an out-of-memory (OOM) condition because malloc is mishandled.
Max CVSS
9.8
EPSS Score
0.55%
Published
2019-10-11
Updated
2019-10-17
/cgi-bin/wapopen in Boa 0.94.14rc21 allows the injection of "../.." using the FILECAMERA variable (sent by GET) to read files with root privileges. NOTE: multiple third parties report that this is a system-integrator issue (e.g., a vulnerability on one type of camera) because Boa does not include any wapopen program or any code to read a FILECAMERA variable.
Max CVSS
7.8
EPSS Score
73.54%
Published
2017-06-24
Updated
2024-04-11
Buffer overflow in send_redirect() in Boa Webserver 0.92r allows remote attackers to DoS via an HTTP GET request requesting a long URI with only '/' and '.' characters.
Max CVSS
7.5
EPSS Score
0.26%
Published
2016-11-30
Updated
2016-12-03
Boa 0.94.14rc21 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
Max CVSS
5.0
EPSS Score
2.40%
Published
2010-01-13
Updated
2018-10-10

CVE-2007-4915

Public exploit
The Intersil isl3893 extensions for Boa 0.93.15, as used on the FreeLan RO80211G-AP and other devices, do not prevent stack writes from entering memory locations used for string constants, which allows remote attackers to change the admin password stored in memory via a long username in an HTTP Basic Authentication request.
Max CVSS
10.0
EPSS Score
71.39%
Published
2007-09-17
Updated
2018-10-15
Directory traversal vulnerability in BOA web server 0.94.8.2 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot) attack in the GET HTTP request that uses a "%2E" instead of a "."
Max CVSS
5.0
EPSS Score
2.50%
Published
2000-12-19
Updated
2017-10-10
10 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!