Imatix

Xitami

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.82%
  • Veröffentlicht 25.03.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Format string vulnerability in Xitami Web Server 2.2a through 2.5c2, and possibly other versions, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a Long Running W...

Exploit
  • EPSS 3.19%
  • Veröffentlicht 25.03.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple format string vulnerabilities in the SSI filter in Xitami Web Server 2.5c2, and possibly other versions, allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a...

Exploit
  • EPSS 82.98%
  • Veröffentlicht 24.09.2007 23:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in iMatix Xitami Web Server 2.5c2 allow remote attackers to execute arbitrary code via a long If-Modified-Since header to (1) xigui32.exe or (2) xitami.exe.

Exploit
  • EPSS 1.32%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Imatix Xitami 2.5 b5 does not properly terminate certain Keep-Alive connections that have been broken or closed early, which allows remote attackers to cause a denial of service (crash) via a large number of concurrent sessions.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cross-site scripting (XSS) vulnerability in Errors.gsl in Imatix Xitami 2.5b4 and 2.5b5 allows remote attackers to inject arbitrary web script or HTML via the (1) Javascript events, as demonstrated via an onerror event in an IMG SRC tag or (2) User-A...

  • EPSS 0.66%
  • Veröffentlicht 02.07.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Xitami 2.5d4 and earlier allows remote attackers to crash the server via an HTTP request to the /aux directory.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 31.12.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Xitami 2.5b installs the testcgi.exe program by default in the cgi-bin directory, which allows remote attackers to gain sensitive configuration information about the web server by accessing the program.