Goahead Software

Goahead Webserver

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.44%
  • Veröffentlicht 06.02.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

GoAhead WebServer before 2.1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an invalid URL, related to the websSafeUrl function.

  • EPSS 5.09%
  • Veröffentlicht 04.03.2008 19:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

goform/QuickStart_c0 on the GoAhead Web Server on the FS4104-AW (aka rooter) VDSL device contains a password in the typepassword field, which allows remote attackers to obtain this password by reading the HTML source, a different vulnerability than C...

Exploit
  • EPSS 20.57%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in GoAhead WebServer 2.1 allows remote attackers to execute arbitrary code via a long HTTP GET request with a large number of subdirectories.

  • EPSS 5.24%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has b...

Exploit
  • EPSS 7.31%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cross-site scripting vulnerability in GoAhead Web Server 2.1 allows remote attackers to execute script as other web users via script in a URL that generates a "404 not found" message, which does not quote the script.

Exploit
  • EPSS 35.75%
  • Veröffentlicht 13.02.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, \, %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed.

Exploit
  • EPSS 6.71%
  • Veröffentlicht 02.07.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

GoAhead webserver 2.1 allows remote attackers to cause a denial of service via an HTTP request to the /aux directory.

  • EPSS 3.78%
  • Veröffentlicht 03.05.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Directory traversal vulnerability in GoAhead web server 2.1 and earlier allows remote attackers to read arbitrary files via a .. attack in an HTTP GET request.