Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Hfs Subscribe
Filtered by product Http File Server
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2008-0405 1 Hfs 1 Http File Server 2018-10-15 10.0 HIGH N/A
Multiple directory traversal vulnerabilities in HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allow remote attackers to create arbitrary (1) files and (2) directories via a .. (dot dot) in an account name, when requesting the / URI; and (3) append arbitrary data to a file via a .. (dot dot) in an account name, when requesting a URI composed of a "/?%0a" sequence followed by the data.
CVE-2008-0406 1 Hfs 1 Http File Server 2018-10-15 5.0 MEDIUM N/A
HTTP File Server (HFS) before 2.2c, when account names are used as log filenames, allows remote attackers to cause a denial of service (daemon crash) via a long account name.
CVE-2008-0407 1 Hfs 1 Http File Server 2018-10-15 5.0 MEDIUM N/A
HTTP File Server (HFS) before 2.2c tags HTTP request log entries with the username sent during HTTP Basic Authentication, regardless of whether authentication succeeded, which might make it more difficult for an administrator to determine who made a remote request.
CVE-2008-0408 1 Hfs 1 Http File Server 2018-10-15 6.4 MEDIUM N/A
HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.
CVE-2008-0409 1 Hfs 1 Http File Server 2018-10-15 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in HTTP File Server (HFS) before 2.2c allows remote attackers to inject arbitrary web script or HTML via the userinfo subcomponent of a URL.
CVE-2008-0410 1 Hfs 1 Http File Server 2018-10-15 5.0 MEDIUM N/A
HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as <id>%version%</id> in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.