Skip to main content
定价企业版
首页/漏洞/EDB-4700
EDB-4700remotewindows已验证

Simple HTTPd 1.38 - Multiple Vulnerabilities

Luigi Auriemma12/7/2007
在Exploit-DB查看在GitLab查看源代码

AI分析AI驱动

漏洞利用代码

Exploit code not available in database

在GitLab查看源代码

相关CVE (2)

CVE-2007-6405

NONE

Sergey Lyubka Simple HTTPD (shttpd) 1.38 and earlier on Windows allows remote attackers to download arbitrary CGI programs or scripts via a URI with an appended (1) '+' character, (2) '.' character, (

Sergey Lyubka Simple HTTPD (shttpd) 1.38 and earlier on Windows allows remote attackers to download arbitrary CGI programs or scripts via a URI with an appended (1) '+' character, (2) '.' character, (...

12/17/2007CWE-200

CVE-2007-6404

NONE

Directory traversal vulnerability in Sergey Lyubka Simple HTTPD (shttpd) 1.38 and earlier on Windows allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI.

Directory traversal vulnerability in Sergey Lyubka Simple HTTPD (shttpd) 1.38 and earlier on Windows allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI.

12/17/2007CWE-22

漏洞利用信息

EDB ID
4700
类型
remote
平台
windows
已验证
是
发布日期
2007-12-07

关联的CVE

CVE-2007-6405CVE-2007-6404

快速操作

下载原始文件在Google搜索
免责声明:此漏洞利用代码仅供教育和授权的安全研究目的使用。请负责任地使用,并仅在您有权测试的系统上使用。