- EPSS 7.81%
- Published 20.11.2013 14:12:30
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
CVE-2013-4559
- EPSS 13.98%
- Published 20.11.2013 14:12:30
- Last modified 11.04.2025 00:51:21
lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple...
CVE-2013-4508
- EPSS 2.91%
- Published 08.11.2013 04:47:22
- Last modified 11.04.2025 00:51:21
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
CVE-2013-1427
- EPSS 0.04%
- Published 21.03.2013 17:55:03
- Last modified 11.04.2025 00:51:21
The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such a...
- EPSS 42.69%
- Published 24.11.2012 20:55:04
- Last modified 11.04.2025 00:51:21
The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-A...
- EPSS 5.56%
- Published 24.12.2011 19:55:05
- Last modified 11.04.2025 00:51:21
Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via...
- EPSS 5.65%
- Published 03.02.2010 19:30:00
- Last modified 11.04.2025 00:51:21
lighttpd before 1.4.26, and 1.5.x, allocates a buffer for each read operation that occurs for a request, which allows remote attackers to cause a denial of service (memory consumption) by breaking a request into small pieces that are sent at a slow r...
CVE-2008-4360
- EPSS 1.14%
- Published 03.10.2008 17:41:40
- Last modified 09.04.2025 00:30:58
mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access r...
CVE-2008-4359
- EPSS 0.51%
- Published 03.10.2008 17:41:40
- Last modified 09.04.2025 00:30:58
lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive inform...
- EPSS 2.93%
- Published 27.09.2008 10:30:03
- Last modified 09.04.2025 00:30:58
Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers.